A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

[KIRJA][B] Iris biometrics: from segmentation to template security

C Rathgeb, A Uhl, P Wild - 2012 - books.google.com
Iris Biometrics: From Segmentation to Template Security provides critical analysis,
challenges and solutions on recent iris biometric research topics, including image …

A reference architecture for biometric template protection based on pseudo identities

J Breebaart, C Busch, J Grave, E Kindt - 2008 - dl.gi.de
Biometric authentication is often considered to enhance identity verification. The use of
biometrics also introduces new challenges to protect the privacy of the subjects while at the …

[PDF][PDF] Biometric encryption: The new breed of untraceable biometrics

A Cavoukian, A Stoianov - Biometrics: fundamentals, theory, and …, 2009 - academia.edu
Biometric technologies promise many benefits, including stronger user authentication,
greater user convenience, improved security, and operational efficiencies. These …

Binary biometrics: An analytic framework to estimate the performance curves under gaussian assumption

EJC Kelkboom, GG Molina, J Breebaart… - … on Systems, Man …, 2010 - ieeexplore.ieee.org
In recent years, the protection of biometric data has gained increased interest from the
scientific community. Methods such as the fuzzy commitment scheme, helper-data system …

Parameterized geometric alignment for minutiae-based fingerprint template protection

B Yang, C Busch - 2009 IEEE 3rd International Conference on …, 2009 - ieeexplore.ieee.org
In this paper a parameterized geometric alignment method is proposed for minutiae-based
fingerprint template protection by transforming an original minutia vicinity into a …

Statistical attack against fuzzy commitment scheme

C Rathgeb, A Uhl - IET biometrics, 2012 - IET
In this study a statistical attack against fuzzy commitment schemes is presented.
Comparisons of different pairs of binary biometric feature vectors yield binomial distributions …

Robust minutiae hash for fingerprint template protection

B Yang, C Busch, P Bours… - Media Forensics and …, 2010 - spiedigitallibrary.org
A robust fingerprint minutiae hash generation algorithm is proposed in this paper to extract a
binary secure hash bit string from each fingerprint minutia and its vicinity. First, ordering of …

[PDF][PDF] Privacy-preserving biometric authentication model for e-finance applications

CA Toli, B Preneel - … of the 4th International Conference on …, 2018 - lirias.kuleuven.be
Widespread use of biometric architectures implies the need to secure highly sensitive data
to respect the privacy rights of the users. In this paper, we discuss the following question: To …

Geometric-aligned cancelable fingerprint templates

B Yang, C Busch, M Derawi, P Bours… - Image Analysis and …, 2009 - Springer
A minutiae encryption algorithm based on geometric transformation of minutiae positions is
proposed to generate cancelable fingerprint templates. A geometric transformation is used …